Robust deployment strategy for security data collection agent
With the frequent occurrence of “network black production” incidents,attackers strategically launch target attacks with the idea of “profit-seeking”.Existing network monitoring systems lack accurate and effective monitoring strategies for “strategic attacks”.Therefore,in an adversarial environment,h...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2019-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019121/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539368587624448 |
---|---|
author | 陈黎丽 王震 郭云川 华佳烽 姚宇超 李凤华 |
author_facet | 陈黎丽 王震 郭云川 华佳烽 姚宇超 李凤华 |
author_sort | 陈黎丽 |
collection | DOAJ |
description | With the frequent occurrence of “network black production” incidents,attackers strategically launch target attacks with the idea of “profit-seeking”.Existing network monitoring systems lack accurate and effective monitoring strategies for “strategic attacks”.Therefore,in an adversarial environment,how to optimize the deployment of collection agents for better monitoring results becomes an extremely important issue.Based on this,a robust deployment strategy of collection agents was proposed for the above mentioned problem.Firstly,the idea of attack-defense game was introduced to measure the collection agents,threat events and their relations,then the MADG model was built.Secondly,considering that the traditional accurate solution algorithm cannot solve the problem,the robust acquisition agent deployment algorithm called RCD algorithm was designed to approximate the problem by using the sub-module and non-growths of the objective function.Finally,the RCD algorithm was verified.The experimental results show that the above model and method is feasible,effective and expandable. |
format | Article |
id | doaj-art-9fd544af69d943c388d8989e13d2789e |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2019-06-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-9fd544af69d943c388d8989e13d2789e2025-01-14T07:17:05ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-06-0140516559727511Robust deployment strategy for security data collection agent陈黎丽王震郭云川华佳烽姚宇超李凤华With the frequent occurrence of “network black production” incidents,attackers strategically launch target attacks with the idea of “profit-seeking”.Existing network monitoring systems lack accurate and effective monitoring strategies for “strategic attacks”.Therefore,in an adversarial environment,how to optimize the deployment of collection agents for better monitoring results becomes an extremely important issue.Based on this,a robust deployment strategy of collection agents was proposed for the above mentioned problem.Firstly,the idea of attack-defense game was introduced to measure the collection agents,threat events and their relations,then the MADG model was built.Secondly,considering that the traditional accurate solution algorithm cannot solve the problem,the robust acquisition agent deployment algorithm called RCD algorithm was designed to approximate the problem by using the sub-module and non-growths of the objective function.Finally,the RCD algorithm was verified.The experimental results show that the above model and method is feasible,effective and expandable.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019121/collection agentsecurity datadefender-attacker game theoryrobustdeployment strategy |
spellingShingle | 陈黎丽 王震 郭云川 华佳烽 姚宇超 李凤华 Robust deployment strategy for security data collection agent Tongxin xuebao collection agent security data defender-attacker game theory robust deployment strategy |
title | Robust deployment strategy for security data collection agent |
title_full | Robust deployment strategy for security data collection agent |
title_fullStr | Robust deployment strategy for security data collection agent |
title_full_unstemmed | Robust deployment strategy for security data collection agent |
title_short | Robust deployment strategy for security data collection agent |
title_sort | robust deployment strategy for security data collection agent |
topic | collection agent security data defender-attacker game theory robust deployment strategy |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019121/ |
work_keys_str_mv | AT chénlílì robustdeploymentstrategyforsecuritydatacollectionagent AT wángzhèn robustdeploymentstrategyforsecuritydatacollectionagent AT guōyúnchuān robustdeploymentstrategyforsecuritydatacollectionagent AT huájiāfēng robustdeploymentstrategyforsecuritydatacollectionagent AT yáoyǔchāo robustdeploymentstrategyforsecuritydatacollectionagent AT lǐfènghuá robustdeploymentstrategyforsecuritydatacollectionagent |